One document matched: draft-haddad-momipriv-problem-statement-00.txt
Internet Engineering Task Force Wassim Haddad
Mobility and Multi-homing Privacy Ericsson
Internet Draft Erik Nordmark
Expires March 2005 Sun Microsystems
Francis Dupont
GET/ENST Bretagne
Marcelo Bagnulo
UC3M
Soohong Daniel Park
Samsung Electronics
Basavaraj Patil
Nokia
October 2004
Privacy for Mobile and Multi-homed Nodes:
MoMiPriv Problem Statement
<draft-haddad-momipriv-problem-statement-00>
Status of this Memo
By submitting this Internet-Draft, I certify that any applicable
patent or other IPR claims of which I am aware have been
disclosed, or will be disclosed, and any of which I become aware
will be disclosed, in accordance with RFC 3668.
This document is an Internet Draft and is in full conformance with
all provisions of Section 10 of RFC 2026.
This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its
areas, and its working groups. Note that other groups may also
distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-
Drafts as reference material or to cite them other than as
"work in progress."
The list of current Internet Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Distribution of this memo is unlimited
Abstract
This memo describes the privacy in mobility and multi-homing
problem statement.
Haddad et al. Expires March 2005 [Page 1]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
Table of Contents
1. Introduction................................................2
2. Glossary....................................................3
3. Problem Statement...........................................6
3.1. The MAC Layer Problem..................................6
3.2. The IP Layer Problem...................................8
3.3. The Interdependency Problem............................9
4. Security Considerations....................................10
5. References.................................................10
6. Authors' Addresses.........................................11
Intellectual Property Statement...............................13
Disclaimer of Validity........................................13
Copyright Statement...........................................13
1. Introduction
In the near future, the mobility and multi-homing features will
coexist in the majority of small devices, e.g., terminals, PDAs,
etc. In order to enable these features, Mobile IPv6 [MIPv6]
protocol has already been designed to solve the mobility issues,
while addressing the multi-homing issues is still an ongoing
work.
However, MIPv6 protocol does not provide any mean/support to
protect the mobile node's privacy when moving across the
internet, while in the multi-homing area, the privacy may well
be supported in any potential solution but may probably lack
some features. This is mainly due to the fact that the privacy
issues are not limited to the IP layer only.
This memo describes the privacy in mobility and multi-homing
(momipriv) problem statement based on IPv6 only.
Haddad et al. Expires March 2005 [Page 2]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
2. Glossary
Anonymity
Anonymity is a property of network security. An entity "A"
in a system has anonymity if no other entity can identify
"A", nor is there any link back to "A" that can be used, nor
any way to verify that any two anonymous acts are performed
by "A".
Anonymity ensures that a user may use a resource or service
without disclosing the user's identity.
Anonymity in wireless networks means that neither the mobile
node nor its system software shall by default expose any
information, that allows any conclusions on the owner or
current use of the node.
Consequently, in scenarios where a device and/or network
identifiers are used (e.g., MAC address, IP address),
neither the communication partner nor any outside attacker
should be able to disclose any possible link between the
respective identifier and the user's identity.
Pseudonymity
Pseudonymity is a weaker property related to anonymity. It
means that one cannot identify an entity, but it may be
possible to prove that two pseudonymous acts were performed
by the same entity.
Pseudonymity ensures that a user may use a resource or
service without disclosing its user identity, but can still
be accountable for that use.
Consequently, a pseudonym is an identifier for a party to a
transaction, which is not in the normal course of events,
sufficient to associate the transaction with a particular
user.
Hence a transaction is pseudonymous in relation to a
particular party if the transaction data contains no direct
identifier for that party, and can only be related to them
in the event that a very specific piece of additional data
is associated with it.
Haddad et al. Expires March 2005 [Page 3]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
Unlinkability
Two events are unlinkable if they are no more and no less
related than they are related concerning the a-priori
knowledge.
Unlinkability ensures that a user may make use of resources
or services without others being able to link these two
uses together.
Note that unlinkability is a sufficient condition of
anonymity, but it is not a necessary condition.
Privacy
Privacy is a more general term than anonymity. Privacy is
the claim of individuals, groups and institutions to
determine for themesleves, when, how and to what extent
information about them is communicated to others.
In wireless telecommunications, privacy addresses especially
the protection of the content as well as the context (e.g.,
time, location, type of service, ...) of a communication
event.
Consequently, neither the mobile node nor its system
software shall support the creation of user-related usage
profiles. Such profiles basically comprise of a correlation
of time and location of the node's use, as well as the type
and details of the transaction performed.
Privacy can even be achieved by disconnectivity, i.e., not
being connected to a network.
Location Privacy
Location Privacy means the capability of a mobile node to
conceal the relation between its location and the personal
identifiable information from third parties.
MAC Address
A MAC Address is a 48 bits unique value associated with a
network adapter. The MAC address uniqueness is by default
global. A MAC Address is also known as the device/hardware
identifier.
Haddad et al. Expires March 2005 [Page 4]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
Link
A communication facility or medium over which nodes can
communicate at the link layer, such as an Ethernet (simple
or bridged). A link is the layer immediately below IP.
IPv6 Address
An IP address is a unique 128-bit IP layer identifier for an
interface or a set of interfaces attached to an IP network.
An IPv6 address can be unicast, i.e., identifier for a
single interface, or anycast, i.e., an identifier for a set
of interfaces, and a packet sent to an anycast address is
delivered to only one interface, or multicast, i.e., an
identifier for a set of interfaces and a packet sent to a
multicast address is delivered to all these interfaces.
Interface Identifier
A number used to identify a node's interface on a link. The
interface identifier is the remaining low-order bits in the
node's IP address after the subnet prefix.
Basic Service Set (BSS)
A set of stations controlled by a single coordination
function.
Extended Service Set (ESS)
A set of one or more interconnected basic service set (BSSs)
and integrated local area networks (LANs) that appears as a
single BSS to the logical link control layer at any station
associated with one of those BSSs.
Distribution System (DS)
A system used to interconnect a set of basic service sets
(BSSs) and integrated local area networks (LANs) to create
an extended service set (ESS).
For more literature about the Glossary content, please refer to
[ANON], [ISO99], [Priv-NG], [Freedom] and [ANON-PRIV].
Haddad et al. Expires March 2005 [Page 5]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
3. Problem Statement
There are two main reasons for writing this document. First,
the growing ability to trace a mobile node by an untrusted
third party, especially in public access networks, is a direct
and serious violation of the mobile user's privacy and can
cause serious damage to its personal, social and professional
life. The second reason is the fact that the privacy problem
is not limited to one layer only and should not be solved
independantly on one layer.
As it appeared in the above, privacy is a more general term
than anonymity/pseudonymity. Privacy becomes a real concern
especially when the mobile node (MN) uses permanent device
and/or network identifiers.
However, in many scenarios, protecting the user's privacy can
be achieved by providing one or many of the privacy aspects
defined above with regards to the mobile node's requirements
and/or location.
For this purpose, we try in the rest of this document to use
the terms defined above, in order to highlight the issues in a
more precise way.
It should be noted that this document focus on the privacy
problem for a mobile and multi-homed node only and does not
make any assumption regarding the privacy of static node,
e.g., static correspondent node (CN). In addition, this
document assumes that the real IPv6 address is not hidden by
default, i.e., any node is always reachable via its real IPv6
address.
The problem statement can be divided into three problems. The
first two problems are related to the identifiers associated
with a mobile device, i.e., the MAC address and the IP address,
and the third problem highlights their interdependency.
3.1 The MAC Layer Problem
The first problem focus on the MAC layer and is raising growing
concerns related to the user's privacy, especially with the
massive ongoing indoor/outdoor deployment of WLAN technologies.
A mobile device attached to a particular link is uniquely
identified on that link by its MAC address, i.e., the device
identifier. In addition, the device identifier is disclosed in
any packet sent by/to the MN when it reaches that particular
link, thus making it a very efficient tool to trace a mobile
Haddad et al. Expires March 2005 [Page 6]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
user in a shared wireless medium access. Similar problems have
caused bad press for cellular operators.
For example, an eavesdropper located in one distributed system
(DS) can trace a mobile node via its device identifier while
moving in the entire ESS, and learn enough information about
the user's activities and whereabouts. Having these information
available in the wrong hands, especially with the exact time
when they occur, may have bad consequences on the user.
Another concern on the MAC layer, which can also be exploited
by an eavesdropper to trace its victim is the sequence number
carried by the frame header. The sequence number is incremented
by 1 for each data frame and allows the bad guy to trace its
targeted node, in addition to the MAC address.
In addition, the sequence number allows also the malicious node
to keep tracing the MN, if/when the real MAC address is replaced
by one or many pseudo-identifier(s) during an ongoing session
[WLAN-IID].
However, it should be noted that even if the real MN's device
identifier remains undisclosed during all the session(s), it may
probably not be enough to provide the unlinkability protection
on the MAC layer, between ongoing session(s).
Actually, if the MN's MAC address is replaced with a static
pseudo-identifier, i.e., to provide pseudonymity, or with
temporary ones, i.e., to provide anonymity, the unlinkability
protection on the MAC layer can be easily broken if the MN's
IPv6 address remains unchanged.
Note that in such scenario, even a periodical change of the
sequence number won't prevent the eavesdropper from correlating
ongoing session(s), pseudo-identifiers and the mobile node.
However, it should be mentioned that replacing the real device
identifier with static/dynamic pseudo-identifiers, in order to
provide anonymity/pseudonymity, during an ongoing session(s),
raises another critical issue on the MAC layer level, which
concerns the uniqueness of these new pseudo-identifier(s).
Note that any temporary identifiers MUST be unique within the
Extended Service Set (ESS) and the distributed system (DS).
Haddad et al. Expires March 2005 [Page 7]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
3.2 The IP Layer Problem
The second problem focus on the IP layer and analyzes the
privacy problems related to IPv6 only.
A MN can configure its IPv6 address either from a DHCP server
or by itself. The latter scenario is called the stateless
address autoconfiguration [STAT], and discloses the MN MAC
address in the IPv6 address, thus enabling an eavesdropper to
easily learn both addresses in this case.
In order to mitigate the privacy concerns raised, from using
the stateless address auto-configuration [PRIV-STAT], [PRIVACY]
introduced a method allowing to periodically change the MN's
interface identifier.
However, being limited to the interface identifier only, such
change discloses the real network identifier, which in turn can
reveal enough information about the user or can even be the
exact piece of information needed by the eavesdropper.
Another limitation to its efficiency lays in the fact that such
change cannot occur during an ongoing session.
Note that while using only a different IPv6 address for each
new session may prevent/mitigate the ability to trace a MN on
the IP layer level, it remains always possible to trace it
through its device identifier(s) on the MAC layer level and
consequently, to learn all IPv6 addresses used by the MN by
correlating different sessions, thus breaking any unlinkability
protection provided at the IP layer.
MIPv6 allows an MN to move across the internet while ensuring
optimal routing (i.e., by using route optimization (RO)) mode
and keeping ongoing session(s) alive. Although these two
features make the RO mode protocol looks efficient, they
disclose the MN's home IPv6 address and its current location,
i.e., care-of address (CoA) in each data packet exchanged
between the MN and the correspondent node (CN).
Furthermore, each time a MN switches to a new network, it has
to send in clear a binding update (BU) message to the CN to
notify it about its new location.
Consequently, a malicious node located between the MN and the
CN is able to identify any packet sent/received by the MN and
trace its movements at any time and any place once it moves
outside its home network(s) [Priv-NG].
MIPv6 defines another mode called the bidirectional tunneling
(BT), which allows the MN to hide its movements and locations
from the CN by sending all data packets through its HA (i.e.,
Haddad et al. Expires March 2005 [Page 8]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
encapsulated). In such mode, the CN uses only the MN's home
IPv6 address to communicate with the MN.
Note that if the CN initiates a session with a MN then it has
to use the MN's home IPv6 address. In such scenario, if the MN
wants to keep its movements hidden from the CN, then it has to
switch to the bidirectional tunneling mode.
Consequently, all data packets sent/received by the MN are
exchanged through the MN's HA and the MN needs to update only
its HA with its location.
Although, the BT mode allows hiding the MN's location to the
CN, it can disclose its real identity and current location to
an eavesdropper located between the HA and the MN (e.g., by
looking to the data packets inner header).
In addition to mobility, the multi-homing feature allows a
mobile node to belong to different home networks and to switch
between these home networks without interrupting ongoing
session(s) [MULTI].
Although multi-homing can be considered as another aspect of
mobility, switching between different home networks, in addition
to moving between foreign networks, can disclose to a malicious
node well located between the multi-homed MN and the CN, part or
all of the MN's home IPv6 addresses, its device identifiers
(e.g., when stateless address autoconfiguring is used) and its
location(s). Such variety of identifiers can make the malicious
eavesdropper's task easier.
For example, a malicious node located between the MN and the CN
can start tracing its victim based on prior knowledge of one of
its home address or MAC address, and by tracking the BU messages
(e.g., the MN is using the RO mode).
After that, the malicious eavesdropper can correlate between
different signaling messages and possibly data packets to expand
his knowledge to other victim's home/MAC addresses.
Learning new identifiers offer the eavesdropper additional tools
to detect and track future movements.
3.3 The Interdependency Problem
The MAC and IP layers problems described above highlight another
concern that needs to be addressed in order to protect the MN's
identifiers and/or hiding its locations: any change/update of
the IP address and the pseudo-identifier must be performed in a
synchronized way.
Haddad et al. Expires March 2005 [Page 9]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
Otherwise, a change/update at the IP layer only, may allow the
eavesdropper to keep tracing the MN via the device identifier
and consequently to learn how/when the MN's identifiers are
modified on the MAC layer, thus making such change(s)
meaningless.
4. Security Considerations
Any potential solution for the momipriv problem, which allows
using temporary device identifiers, dynamic pseudo-IP addresses
and other parameters during an ongoing session should not allow
a malicious eavesdropper to learn how nor when these identifiers
are updated.
Any potential solution must protect against replaying messages
using old identifiers and/or hijacking an ongoing session during
an update of the identifiers.
Any potential solution should not allow exploiting any aspect of
privacy, in order to gain access to networks.
5. References
[ANON] A. Pfitzmann et al. "Anonymity, Unobservability,
Pseudonymity, and Identity Management - A Proposal
for Terminology", Draft v0.21, September, 2004.
[ANON-PRIV] M. Schmidt, "Subscriptionless Mobile Networking:
Anonymity and Privacy Aspects within Personal Area
Networks", IEEE WCNC 2002.
[Freedom] A.F. Westin, "Privacy and Freedom", Atheneum Press,
New York, USA, 1967.
[ISO99] ISO IS 15408, 1999, http://www.commoncriteria.org/.
[MIPv6] D. Johnson, C. Perkins, J. Arkko, "Mobility Support
in IPv6", RFC 3775, June 2004.
[MULTI] N. Montavont, R. Wakikawa, T. Ernst, T. Noel, C. Ng,
"Analysis of Multihoming in Mobile IPv6",
draft-montavont-mobileip-multihoming-pb-statement-01,
July, 2004.
[PRIV-NG] A. Escudero-Pascual, "Privacy in the Next Generation
Haddad et al. Expires March 2005 [Page 10]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
Internet", December 2002.
[PRIV-STAT] S. Deering, B. Hinden, "Statement on IPv6 Address
Privacy", http://playground.sun.com/pub/ipng/html/
specs/ipv6-address-privacy.html November, 1999.
[Privacy] T. Narten, R. Draves, S. Krishnan, "Privacy
Extensions for Stateless Address Autoconfiguration
in IPv6", draft-ietf-ipv6-privacy-addrs-v2,
September, 2004.
[STAT] S. Thomson, T. Narten, T. Jinmei, "IPv6 Stateless
Address Autoconfiguration",
draft-ietf-ipv6-rfc2462bis-05, August 2004.
[WLAN-IID] M. Gruteser, D. Grunwald, "Enhancing Location
Privacy in Wireless LAN Through Disposable Interface
Identifiers: A Quantitative Analysis, September
2003", First ACM International Workshop on Wireless
Mobile Applications and Services on WLAN Hotspots,
September 2003.
6. Authors'Addresses
Wassim Haddad
Ericsson Research
8400, Decarie Blvd
Town of Mount Royal
Quebec H4P 2N2
Canada
Phone: +1 514 345 7900
E-Mail: Wassim.Haddad@ericsson.com
Erik Nordmark
Sun Microsystems, Inc.
17 Network Circle
Mountain View, CA
USA
Phone: +1 650 786 2921
Fax: +1 650 786 5896
E-Mail: Erik.Nordmark@sun.com
Francis Dupont
GET/ENST Bretagne
Haddad et al. Expires March 2005 [Page 11]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
Campus de Rennes
2, rue de la Chataigneraie
CS 17607
35576 Cesson-Sevigne Cedex
France
E-Mail: Francis.Dupont@enst-bretagne.fr
Marcelo Bagnulo
Universidad Carlos III de Madrid
Av. Universidad 30
Leganes, Madrid 28911
SPAIN
Phone: 34 91 6249500
E-Mail: Marcelo@it.uc3m.es
URI: http://www.it.uc3m.es/marcelo
Soohong Daniel Park
Samsung Electronics
Mobile Platform Laboratory, Samsung Electronics
416. Maetan-Dong, Yeongtong-Gu, Suwon
Korea
Phone: +81 31 200 4508
E-Mail: soohong.park@samsung.com
Basavaraj Patil
Nokia
6000 Connection Drive
Irving, TX 75039
USA
Phone: +1 972 894-6709
E-Mail: Basavaraj.Patil@nokia.com
Haddad et al. Expires March 2005 [Page 12]
INTERNET-DRAFT MoMiPriv Problem Statement October 2004
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of
any Intellectual Property Rights or other rights that might be
claimed to pertain to the implementation or use of the
technology described in this document or the extent to which any
license under such rights might or might not be available; nor
does it represent that it has made any independent effort to
identify any such rights. Information on the IETF's procedures
with respect to rights in IETF Documents can be found in BCP 78
and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the
use of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR
repository at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention
any copyrights, patents or patent applications, or other
proprietary rights that may cover technology that may be
required to implement this standard. Please address the
information to the IETF at ietf-ipr@ietf.org.
The IETF has been notified of intellectual property rights
claimed in regard to some or all of the specification contained
in this document. For more information consult the online list
of claimed rights.
Disclaimer of Validity
This document and the information contained herein are provided
on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY
THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY
RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2004). This document is
subject to the rights, licenses and restrictions contained in
BCP 78, and except as set forth therein, the authors retain all
their rights.
Haddad et al. Expires March 2005 [Page 13] | PAFTECH AB 2003-2026 | 2026-04-21 20:15:46 |